Overview
TheIEUrls command enumerates Internet Explorer’s typed URL history - URLs that users manually typed into the address bar. By default, it shows URLs from the last 7 days, but this can be customized. This provides insight into user browsing patterns and manually accessed resources.
Important: User commands run for the current user if not elevated and for ALL users if elevated.
Syntax
Arguments
- days: Number of days to look back (default: 7)
Output
The command returns:- Typed URLs from IE address bar
- Timestamps of when URLs were typed
- URL patterns revealing user interests
- Internal and external web resources
- User context for each URL entry
Output
The command supports remote execution (marked with + in the command list).Use Cases
Red Team
- Infrastructure Discovery: Identify manually accessed internal web applications
- Network Mapping: Discover IP addresses and hostnames from typed URLs
- User Profiling: Understand user roles and responsibilities based on accessed sites
- Target Identification: Find admin panels, VPN portals, and management interfaces
- Intelligence Gathering: Collect URLs that may not appear in bookmarks or full history
Blue Team
- Incident Response: Track manually accessed URLs during security investigations
- Insider Threat Detection: Identify suspicious or unauthorized site access
- User Behavior Analysis: Understand manual browsing patterns
- Security Audit: Review typed URLs for policy violations
- Forensic Analysis: Reconstruct user activity timelines from typed URLs
Example Output
Example with Argument
Show typed URLs from the last 30 days:Privilege Context
- Non-Elevated: Returns typed URLs for the current user only
- Elevated: Returns typed URLs for ALL users on the system, providing comprehensive visibility of manually accessed sites
Remote Execution
This command supports remote execution (marked with + in the command list). Remote syntax:Detection Considerations
Indicators
- Registry enumeration of TypedURLs keys
- Access to user registry hives (HKCU\Software\Microsoft\Internet Explorer\TypedURLs)
- Reading browser history data
- Enumeration across multiple user profiles
Defensive Monitoring
- Monitor registry access to TypedURLs keys
- Alert on automated enumeration of browser history
- Track processes reading IE history data
- Log unusual access patterns to browser registry keys
- Detect reconnaissance tools querying typed URLs
- Monitor for bulk enumeration across multiple users
What Typed URLs Reveal
- Direct access to admin interfaces suggests privileged users
- IP address typing indicates technical knowledge or internal systems
- VPN/remote access URLs show remote connectivity methods
- Internal application URLs reveal organizational infrastructure
- Pattern of manual URL entry suggests specific workflows
Related Commands
- IEFavorites: Lists Internet Explorer bookmarked sites
- IETabs: Shows currently open Internet Explorer tabs
- ChromiumHistory: Parses Chromium browser history
- FirefoxHistory: Parses Firefox browser history
- ExplorerMRUs: Shows recently accessed files